Sciweavers

1941 search results - page 261 / 389
» The architecture design of a cross-domain context management...
Sort
View
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
15 years 8 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
IJCNN
2006
IEEE
15 years 7 months ago
Patterns, Hypergraphs and Embodied General Intelligence
—It is proposed that the creation of Artificial General Intelligence (AGI) at the human level and ultimately beyond is a problem addressable via integrating computer science algo...
Ben Goertzel
SBACPAD
2003
IEEE
121views Hardware» more  SBACPAD 2003»
15 years 6 months ago
Optimizing Packet Capture on Symmetric Multiprocessing Machines
Traffic monitoring and analysis based on general purpose systems with high speed interfaces, such as Gigabit Ethernet and 10 Gigabit Ethernet, requires carefully designed software...
Gianluca Varenni, Mario Baldi, Loris Degioanni, Fu...
CF
2004
ACM
15 years 5 months ago
Reflections on the memory wall
This paper looks at the evolution of the "Memory Wall" problem over the past decade. It begins by reviewing the short Computer Architecture News note that coined the phr...
Sally A. McKee
DATE
1999
IEEE
120views Hardware» more  DATE 1999»
15 years 5 months ago
Hardware Synthesis from C/C++ Models
Software programming languages, such as C/C++, have been used as means for specifying hardware for quite a while. Different design methodologies have exploited the advantages of f...
Giovanni De Micheli